Unauthenticated OS Command Injection Vulnerability in MajorDoMo by MajorDoMo
CVE-2026-27175
Key Information:
Badges
What is CVE-2026-27175?
MajorDoMo is susceptible to an unauthenticated OS command injection vulnerability due to improper input handling in the rc/index.php file. The application interpolates user-supplied data from the $param variable into a command string without appropriate sanitization. The command is processed by safe_exec(), which lacks input validation before storing it in a database queue. An unauthenticated attacker can exploit this weakness by initiating a race condition. By triggering the pollable cycle_execs.php script while simultaneously injecting malicious payloads through the rc endpoint, it enables remote code execution almost instantaneously, leading to potential severe security breaches.
Affected Version(s)
MajorDoMo 0
News Articles
References
EPSS Score
24% chance of being exploited in the next 30 days.
CVSS V4
Timeline
- π°
Used in Ransomware
- πΎ
Exploit known to exist
- π°
First article discovered by The Hacker News
Vulnerability published
Vulnerability Reserved
